OpenCTI is an open-source cyber threat intelligence platform. Before 6.3.0, general users can access information that can only be accessed by users with access privileges to admin and support information (SETTINGS_SUPPORT). This is due to inadequate access control for support information (http://<opencti_domain>/storage/get/support/UUID/UUID.zip), and that the UUID is available to general users using an attached query (logs query). This vulnerability is fixed in 6.3.0.
History

Fri, 27 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Dec 2024 21:45:00 +0000

Type Values Removed Values Added
Description OpenCTI is an open-source cyber threat intelligence platform. Before 6.3.0, general users can access information that can only be accessed by users with access privileges to admin and support information (SETTINGS_SUPPORT). This is due to inadequate access control for support information (http://<opencti_domain>/storage/get/support/UUID/UUID.zip), and that the UUID is available to general users using an attached query (logs query). This vulnerability is fixed in 6.3.0.
Title OpenCTI leaks support information due to inadequate access control
Weaknesses CWE-200
CWE-285
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-12-26T21:34:48.751Z

Updated: 2024-12-27T16:19:19.600Z

Reserved: 2024-09-09T14:23:07.504Z

Link: CVE-2024-45805

cve-icon Vulnrichment

Updated: 2024-12-27T16:19:15.515Z

cve-icon NVD

Status : Received

Published: 2024-12-26T22:15:15.083

Modified: 2024-12-27T17:15:08.323

Link: CVE-2024-45805

cve-icon Redhat

No data.